HackDig : Dig high-quality web security articles for hacker

We first detected the banking malware EMOTET back in 2014, we looked into the banking malware’s routines and behaviors and took note of its information stealing abilities via network sniffing. After a period of relative inactivity, it appears it’s making a comeback with increased activity from new variants (Detected by Trend Micro as TSPY_EMOTET.AUSJLA

By Alice Decker, Jasen Sumalapao, and Gilber Sison
In early December, GoldenEye ransomware (detected by Trend Micro as RANSOM_GOLDENEYE.A) was observed targeting German-speaking users—particularly those belonging to the human resource department. GoldenEye, a relabeled version of the Petya (RANSOM_PETYA) and Mischa (RANSOM_MISCHA) ransomware combo, GoldenEy

Introduction
In the summer of 2014, the company Trend Micro announced the detection of a new threat - the banking Trojan Emotet. The description indicated that the malware could steal bank account details by intercepting traffic. We call this modification version 1.
In the autumn of that year a new version of Emotet was found. It caugh

Security experts at Microsoft detected a new variant in the Win32/Emotet family which is targeting German users with a new spam email campaign.
Researchers from Microsoft have uncovered a new criminal campaign is targeting German users with a new variant of a sophisticated banking malware, Trojan:Win32/Emotet.C. The attacker